version 1.24, 2020/01/15 20:15:10 |
version 1.25, 2020/01/28 21:30:52 |
|
|
A source code patch exists which remedies this problem.</a> |
A source code patch exists which remedies this problem.</a> |
<p> |
<p> |
|
|
|
<li id="p029_smtpd_tls"> |
|
<strong>029: RELIABILITY FIX: January 30, 2020</strong> |
|
<i>All architectures</i> |
|
<br> |
|
smtpd can crash on opportunistic TLS downgrade, causing a denial of service. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.5/common/029_smtpd_tls.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
|
<li id="p030_smtpd_exec"> |
|
<strong>030: SECURITY FIX: January 30, 2020</strong> |
|
<i>All architectures</i> |
|
<br> |
|
An incorrect check allows an attacker to trick mbox delivery into executing |
|
arbitrary commands as root and lmtp delivery into executing arbitrary commands |
|
as an unprivileged user. |
|
<br> |
|
<a href="https://ftp.openbsd.org/pub/OpenBSD/patches/6.5/common/030_smtpd_exec.patch.sig"> |
|
A source code patch exists which remedies this problem.</a> |
|
<p> |
|
|
</ul> |
</ul> |
|
|
<hr> |
<hr> |